Role-based views

One screen, three perspectives.

Inbox Threat Ops gives each role the signals they care about, without switching tools or rebuilding dashboards.

  • CISO, operational and risk metrics
  • Security Analyst, hands-on queue and investigation
  • Human Risk, user-centric risk and exposure
CISO
Security Analyst
Human Risk

Inbox Threat Ops

Targeted insights on email threats and attack patterns.

Operational Insights
Email Triage
View adapts to the selected role
System Active · 25, 812 Emails Analyzed

Detected Threats (6)

Monthly
$ Risk Sender Subject Status Sophistication
$15Kj.morgan@info-deals…I found this useful resourceInbox QuarantinedCrafted
$50K mark.chen@docusing-secure.comSharing a relevant docReleasedEngineered
$50K treasury@henderson…Quick question on the contractQuarantinedOrchestrated
$5Kshare@files-secure.ioThought this might helpAuto QuarantinedCrafted
Detected Threats queue

Every alert, in dollars and context.

Each row surfaces the metadata an analyst needs at a glance, risk dollarization, sender, recipients (stacked when a campaign hits multiple inboxes), priority, status, verdict, and sophistication tier (T1–T5).

Search, filter, customize columns, and paginate up to 50 alerts per page. A live banner at the top shows total emails analyzed in real time.

AI Triage findings

Pre-investigated before you click.

Every alert opens with a prioritized list of the most important indicators, embedded QR codes, malicious phishing domains, credential-theft intent, lookalike domain registrations.

Findings are color-coded by severity. The count is visible up front so analysts can scan the queue, not the email body.

AI TRIAGE
5 findings
  • Wire-routing redirect pattern targeting finance + ops cluster (14 recipients).
  • Lookalike domain “docusing-secure.com” registered 11 days ago. Real domain: docusign.com.
  • AI-generated body matches internal voice, sender LLM trained on prior thread context.
  • No prior cross-recipient communication graph, relationship fabricated.
  • Released by analyst manually, flagged for re-review per policy.
Threat Analysis
RISK$50K T3Orchestrated PRIP3
TYPE
BEC
INTENT
Wire Fraud
MITRE
T1566.003T1534
FOUND
Targeted
Side-by-side investigation

Email left, verdict right.

Click any threat to open a dual-pane view. Email preview with secured headers and content on the left. Threat analysis, Type, Intent, MITRE ATT&CK mappings, impersonated brands, found source, on the right.

Queue navigation lets you move between alerts without leaving the panel.

Full investigation depth

Reasoning, not just verdicts.

An expandable section covers refractive reasoning across four dimensions, MITRE mappings, sophistication tier, dollarized risk, headers, indicators, and raw EML.

  • Attacker Objectives, download attachment, scan QR, visit malicious site
  • Deception Techniques, impersonation, security-update disguise, QR obfuscation
  • Behavioral Anomalies, deviations from expected patterns for the mailbox, sender, or infrastructure
Reasoning
Headers
EML
Indicators
Risk
REFRACTIVE REASONING ANALYSIS

Independent analysis across four dimensions to reduce false positives and explain threat classification.

Harm Potential

Multi-recipient wire-routing redirect. If acted on, $50K+ mid-month vendor payment routes to attacker-controlled account.

  • • Blast radius: AP team plus three approval-authority leaders.
  • • Recovery window: 24–72 hrs after wire executes.
Esc
Close panel
Next alert
Previous alert
R
Release to user
Q
Quarantine
One-click actions

Decisions in one keystroke.

Mark false positive, release to user, or sweep similar, directly from the panel. Bulk actions let you select multiple threats and apply a verdict in one move.

Keyboard shortcuts close the loop for analysts working a queue at speed.

Like what you saw?

Your real queue. Triaged.

Fifteen-minute walkthrough on alerts from your own environment. Watch TRACE pre-investigate the same emails your SOC is fighting today.